INSEC ENSIAS ClubNavigating the Digital Realm: A Scientific Exploration of Networks and CybersecurityINTRODUCTION:Nov 22, 2023Nov 22, 2023
INSEC ENSIAS ClubBlog10: MISC — An overview of the ELF formatDefinition of the ELF formatMay 6, 2023May 6, 2023
INSEC ENSIAS ClubBlog09: Misc — MCSC v10 Writeups: Part Two (Pwn Challenges)Hello again folks! You’ve been a lot to request the writeups for the pwn challenges from the MCSC v10’s CTF. So, here they are.Mar 6, 2023Mar 6, 2023
INSEC ENSIAS ClubBlog08: Misc — MCSC v10 Writeups: Part One (Reverse Challenges)Hello Folks! The v10 of our major event, the MCSC, has come to an end and so has its CTF competition. The winners have been crowned, but…Mar 6, 2023Mar 6, 2023
INSEC ENSIAS ClubBlog06: Misc — How speedrunners came to be at the cutting edge of binary exploitation techniquesFor many, watching a speedrun might seem like watching a magician perform. To put it briefly, a speedrun in general is when a highly…Dec 10, 2022Dec 10, 2022
INSEC ENSIAS ClubBlog05: BFTP — Koobface: Part One — The Zombie ArmyThe day is the 31st of July 2008. “I Kissed A Girl” by Katy Perry is at the top of the Billboard Hot 100, but things are starting to get…Dec 4, 2022Dec 4, 2022
INSEC ENSIAS ClubBlog04: Misc — Assembly’s ABCsNote: This blog will consider that you have basic knowledge of how a computer works, as well as some coding knowledge. Now, let’s get right…Nov 26, 2022Nov 26, 2022
INSEC ENSIAS ClubBlog02: T&T — Passwords! TOO MANY OF THEMHi Folks! Welcome back to our blog. Today we will be looking together at an issue that almost everyone deals with on a daily basis, the…Nov 12, 2022Nov 12, 2022